archive-lv.com


Web directory, archive
Search archive-lv.com:


Find domain in archive system:
archive-lv.com » LV » D » DSS.LV

Total: 207

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Services/solutions - Data Security Solutions
    because of disloyal employees and competitors but also to pirates of digital era cybercriminals DSS provides information security services to help companies of all sizes protect their IT security assets Trainings Tech Support and HelpDesk IT security audit Integration Pen Testing IT Security Consultations Pen Testing A final written report provides an analysis of any security or service problems discovered together with proposed solutions links to detailed advisories and recommendations for improving the security of the service under test Areas Covered by Web Application Testing Configuration errors Application loopholes in server code or scripts Advice on data that could have been exposed due to past errors Testing for known vulnerabilities Reducing the risk and enticement to attack Advice on fixes and future security plans Typical Issues Discovered in an Application Test Cross site scripting SQL injection Server misconfigurations Form hidden field manipulation Command injection Cookie poisoning Well known platform vulnerabilities Insecure use of cryptography Back doors and debug options Errors triggering sensitive information leak Broken ACLs Weak passwords Weak session management Buffer overflows Forceful browsing CGI BIN manipulation Risk reduction to zero day exploits Cost Duration The duration of a test depends on the size and complexity of a site

    Original URL path: http://dss.lv/en/pakalpojumi/it-security-services/pen-testing/16/ (2013-11-15)
    Open archived version from archive


  • Services/solutions - Data Security Solutions
    and not by angels we tend to make mistakes Every IT system is vulnerable and at risk not only because of disloyal employees and competitors but also to pirates of digital era cybercriminals DSS provides information security services to help companies of all sizes protect their IT security assets Trainings Tech Support and HelpDesk IT security audit Integration Pen Testing IT Security Consultations IT Security Consultations New business processes new business IT systems changes of business plans growth expansion merge or maybe outdated security tools affect organizations so they need to continuously measure current state of all business risks related to IT That includes close following of global news about new IT security threats and new technologies long comparison processes of at first glance similar technology vendors with different products and combining with own business processes It is much efficient to trust professionals to receive fast and quality consultations Data Security Solutions experts can help your organization with following Business vulnerability assessment from IT Security perspective Business and technical requirements preparation Market analysis technology comparisons and evaluations IT Security strategy Consulting on any question related to IT Security Customer feedback QRadar Security Intelligence Platform integrated in our infrastructure by Data

    Original URL path: http://dss.lv/en/pakalpojumi/it-security-services/it-security-consultations/43/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    security audit Integration Pen Testing IT Security Consultations Trainings The assurance that the designed and the integrated IT Security systems would work with full efficiency is correct knowledge transfer of system s configuration and management use cases and any related processes Tech Support and HelpDesk One of the most critical questions of any IT system is technical support IT Security systems are in most cases the key business critical systems so require fast reaction time fast replacement immediate technical response regarding finding answers to common questions on how to download install uninstall upgrade update remove migrate and so on IT security audit Security audits are typically conducted for the purposes of business information security risk management and regulatory compliance Security audits measure an information system s performance against a list of criteria Integration Integrating different elements of an organization s physical and logical security systems offers a range of benefits Pen Testing IT Security Penetration testing service is an IT systems security audit performed by experienced security professionals and using global leading technology tools A key feature of the service and one which cannot be covered by relying solely on automated testing is application testing IT Security Consultations Not a

    Original URL path: http://dss.lv/en/pakalpojumi/it-security-services/1/en/pakalpojumi/it-security-services/trainings/4/ (2013-11-15)
    Open archived version from archive


  • Services/solutions - Data Security Solutions
    digital era cybercriminals DSS provides information security services to help companies of all sizes protect their IT security assets Notice Trying to get property of non object in home www www dss lv htdocs pge subpakalpojums php on line 26 Notice Trying to get property of non object in home www www dss lv htdocs pge subpakalpojums php on line 27 Notice Trying to get property of non object in

    Original URL path: http://dss.lv/en/pakalpojumi/it-security-services/1/technical-support/5/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    address MobileIron s approach is to simplify the problem for IT finance and end users by moving smartphone data to the enterprise cloud MobileIron MDM MAM Security MobileIron MDM add on modules Voice Call and SMS Encryption Secure Mobile File Sharing for Enterprise MobileIron MDM MAM Security Advanced Mobile Device Management MDM combines traditional mobile device management capabilities with comprehensive security and app capabilities powered by the MobileIron platform The administrator can manage the lifecycle of the device and its apps from registration to retirement and quickly get mobile operations under control manufacturers of applied products MobileIron MDM add on modules MobileIron featured add ons for better and specific policy development manufacturers of applied products Voice Call and SMS Encryption Protect your calls and SMS correspondece making data stream unavaiable to thirt persons by encypting it manufacturers of applied products Secure Mobile File Sharing for Enterprise Designed for the enterprise Accellion provides secure mobile file sharing capabilities for employees project teams internal external collaboration virtual data rooms and deal rooms manufacturers of applied products Customer feedback QRadar Security Intelligence Platform integrated in our infrastructure by Data Security Solutions became the cornerstone of our security strategy Aleksejs Kudrjašovs CSO AB LV

    Original URL path: http://dss.lv/en/pakalpojumi/mobile-security/9/en/pakalpojumi/mobile-security/secure-mobile-file-sharing-for-enterprise/44/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    an intuitive user interface that integrates previously disparate indicators of risk including configuration data network activity data network and security events and vulnerability scan results A comprehensive out of the box library of industry specific policy templates helps assess risk across multiple regulatory mandates and network security best practices such as PCI HIPAA CoCo and ISO 27001 among many others In addition the templates are easily extended to align with an organization s internal network security policies Simplified multi vendor configuration audits With QRadar Risk Manager organizations can begin to introduce consistency across network and security configuration through automated configuration collection analysis and alerting QRadar Risk Manager provides automated configuration audit across an organization s multi vendor switches routers firewalls and IDS IPS Key configuration audit capabilities include A unique ability to normalize multi vendor device configuration QRadar Risk Manager provides a detailed and intuitive assessment of how devices are configured including defined firewall rules security policy and network hierarchy and maintain a history of configuration changes audit configuration rules on a device and compares this across devices Centralized history of enterprise wide configuration changes Leveraging this feature users can easily audit configurations across a multi vendor network with historical context This powerful capability makes it easier to compare normalized device configurations from a single device or from different devices and is instrumental in building an enterprise wide representation of a network s topology Topology mapping that provides greater clarity of allowed and denied activity across the entire network which results in improved consistency of device configurations reduced risk of mis configurations and a better understanding of the impact of configuration changes Advanced security modeling and simulations QRadar Risk Manager s Advanced Modeling and Simulation feature leverages the broad array of risk indicators which helps network security professionals prioritize their most significant areas of risk Key modeling and simulation features include The ability to quickly understand the risk impact of proposed changes to a network s configuration before the changes are implemented on the actual network greatly minimizing the time to roll out new applications and services Analysis of VA scan results in conjunction with active network topology profiling provides a unique prioritization of the most vulnerable systems Reporting that not only summarizes which assets have vulnerabilities but also exposes those assets that are vulnerable due to network configurations resulting in improved operational efficiency and security Powerful network security visualization QRadar Risk Manager offers two network visualization tools that provide unique risk focused graphical representations of the network s configurations Both visualization tools offer network and security professionals a revolutionary investigative capacity by providing before during and after vulnerability information Key visualization features include A comprehensive network topology tool that provides detailed views into how network traffic can or is traversing your network A powerful Connection Monitor tool which provides fast and efficient investigation of network activity Integrated network mappings add value by enabling network security professionals to assess when traffic can or is occurring to or from specific geographic

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/risk-compliance-management/10/ (2013-11-15)
    Open archived version from archive

  • Success stories - About company - Data Security Solutions
    RSA Baltics Accellion Actiance AirTight Networks Avecto Balabit Catbird Cellcrypt Centrify Cyberoam ForeScout IBM Imprivata Infowatch Ipoque Lumension McAfee MobileIron PGP Prolexic Proofpoint Protected Networks Radware SecPoint Sourcefire SpectorSoft Symantec Varonis Vasco WhatsUp Gold ERGO ERGO ERGO secures its internal system with Vasco Digipass ERGO Group is one of the major insurance groups in Europe The company offers a range of insurance provision and services to a 40 million customer base In Latvia the company is represented by two of its subsidiaries ERGO Latvia and ERGO Life Insurance SE The first one focuses on property and casualty insurance the latter on health and life insurance Although the two companies have different purposes and partners they are part of one and the same enterprise ERGO s salespeople collect their data in an internal system that ought to be accessible anytime and anywhere in Latvia and even beyond its borders ERGO was resolved to implement an improved security solution for its internal insurance Therefore strong authentication was set up Read more Customer feedback QRadar Security Intelligence Platform integrated in our infrastructure by Data Security Solutions became the cornerstone of our security strategy Aleksejs Kudrjašovs CSO AB LV Bank view all Ask us

    Original URL path: http://dss.lv/en/par-uznemumu/portfolio/?itm=1:uznemumi (2013-11-15)
    Open archived version from archive

  • Success stories - About company - Data Security Solutions
    customer base In Latvia the company is represented by two of its subsidiaries ERGO Latvia and ERGO Life Insurance SE The first one focuses on property and casualty insurance the latter on health and life insurance Although the two companies have different purposes and partners they are part of one and the same enterprise ERGO s salespeople collect their data in an internal system that ought to be accessible anytime and anywhere in Latvia and even beyond its borders ERGO was resolved to implement an improved security solution for its internal insurance Therefore strong authentication was set up Objective ERGO s salespeople store all their business critical and clients data in an internal insurance system which has to be available and securely accessible anywhere and anytime Challenge Besides the internal demand for a safe access system the company had to adhere to the regulations prescribed by the Finance and Capital Market Commission and the technical specifications stipulated by its IT department Solution ERGO chose to implement VASCO s DIGIPASS GO 6 for its sales partners DIGIPASS for Mobile was deployed for IT staff IDENTIKEY Gold was implemented on the back end side Download the entire case study Customer feedback QRadar

    Original URL path: http://dss.lv/en/par-uznemumu/portfolio/ergo-secures-its-internal-system-with-vasco-digipass/1/ (2013-11-15)
    Open archived version from archive


archive-lv.com, 2017-08-16